Mi Fi - MiFi in The News - Security Issues

Security Issues

In January 2010, two major security holes were discovered with the Novatel MiFi 2200 which, if properly exploited, could allow a malicious user to obtain the device's current GPS location and security keys. If the malicious user were physically close enough to use the device's Wi-Fi signal, this could give access to the MiFi's 3G connection as well as any other connected devices. Novatel responded that a security patch would be available in February 2010.

The popularity of MiFi devices can also be problematic for corporate network security. Corporations generally expect to control on-site internet access: many use firewalls to reduce the risk of malware, and some enforce restrictions aimed at employee productivity. Personal mobile hotspots may provide a "back door" by which employees can circumvent these precautions.

Read more about this topic:  Mi Fi, MiFi in The News

Other articles related to "security, security issues, issue":

Cloud Clients - Issues - Security
... Main article Cloud computing security As cloud computing is achieving increased popularity, concerns are being voiced about the security issues introduced through adoption of this new model ... An alternative perspective on the topic of cloud security is that this is but another, although quite broad, case of "applied security" and that similar security principles that apply in shared multi-user mainframe ... The relative security of cloud computing services is a contentious issue that may be delaying its adoption ...
Lattice-based Cryptography - Security Issues - Quantum Algorithms and Lattices
... Attempts to solve lattice problems by quantum algorithms have been made since Shor’s discovery of the quantum factoring algorithm in the mid-1990s, but have so far met with little success if any at all. ...
Cloud Computing - Issues - Security
... Main article Cloud computing security As cloud computing is achieving increased popularity, concerns are being voiced about the security issues introduced through adoption of this new model ... An alternative perspective on the topic of cloud security is that this is but another, although quite broad, case of "applied security" and that similar security principles that apply ... The relative security of cloud computing services is a contentious issue that may be delaying its adoption ...

Famous quotes containing the words issues and/or security:

    Your toddler will be “good” if he feels like doing what you happen to want him to do and does not happen to feel like doing anything you would dislike. With a little cleverness you can organize life as a whole, and issues in particular, so that you both want the same thing most of the time.
    Penelope Leach (20th century)

    In the long course of history, having people who understand your thought is much greater security than another submarine.
    J. William Fulbright (b. 1905)